首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1134篇
  免费   64篇
  国内免费   2篇
化学   685篇
晶体学   5篇
力学   21篇
数学   298篇
物理学   191篇
  2023年   9篇
  2022年   13篇
  2021年   17篇
  2020年   18篇
  2019年   31篇
  2018年   33篇
  2017年   26篇
  2016年   86篇
  2015年   44篇
  2014年   51篇
  2013年   84篇
  2012年   101篇
  2011年   105篇
  2010年   49篇
  2009年   46篇
  2008年   73篇
  2007年   56篇
  2006年   60篇
  2005年   53篇
  2004年   36篇
  2003年   28篇
  2002年   18篇
  2001年   10篇
  2000年   11篇
  1999年   3篇
  1998年   7篇
  1997年   6篇
  1996年   6篇
  1995年   4篇
  1994年   6篇
  1993年   7篇
  1992年   3篇
  1991年   12篇
  1990年   12篇
  1989年   10篇
  1988年   5篇
  1987年   8篇
  1986年   5篇
  1985年   2篇
  1984年   8篇
  1983年   4篇
  1982年   3篇
  1981年   6篇
  1980年   8篇
  1978年   4篇
  1973年   2篇
  1972年   3篇
  1963年   2篇
  1961年   1篇
  1909年   1篇
排序方式: 共有1200条查询结果,搜索用时 15 毫秒
61.
We consider the problem
?2Δu?V(x)u+up=0,u>0,uH1(R2),
where p>1, ?>0 is a small parameter and V is a uniformly positive, smooth potential. Let Γ be a closed curve, nondegenerate geodesic relative to the weighted arclength ΓVσ, where σ=p+1p?1?12. We prove the existence of a solution uε concentrating along the whole of Γ, exponentially small in ? at any positive distance from it, provided that ? is small and away from certain critical numbers. This proves a conjecture raised in [A. Ambrosetti, A. Malchiodi, W.-M. Ni, Singularly perturbed elliptic equations with symmetry: existence of solutions concentrating on spheres, Part I, Commun. Math. Phys. 235 (2003) 427–466] in the two-dimensional case. To cite this article: M. del Pino et al., C. R. Acad. Sci. Paris, Ser. I 341 (2005).  相似文献   
62.
There are aspects of privacy theory that are analogous to quantum theory. In particular one can define distillable key and key cost in parallel to distillable entanglement and entanglement cost. We present here classical privacy theory as a particular case of information theory with adversaries, where similar general laws hold as in entanglement theory. We place the result of Renner and Wolf—that intrinsic information is lower bound for key cost—into this general formalism. Then we show that the question of whether intrinsic information is equal to key cost is equivalent to the question of whether Alice and Bob can create a distribution product with Eve using IM bits of secret key. We also propose a natural analogue of relative entropy of entanglement in privacy theory and show that it is equal to the intrinsic information. We also provide a formula analogous to the entanglement of formation for classical distributions. It is our pleasure to dedicate this paper to Asher Peres on the occasion of his seventieth birthday.  相似文献   
63.
64.
The smallness of quark masses suppresses the CP violation from the Kobayashi-Maskawa phase to a level that is many orders of magnitude below what is required to explain the observed baryon asymmetry. We point out that if, as a result of time variation in the Yukawa couplings, quark masses were large at the time of the electroweak phase transition, then the Kobayashi-Maskawa mechanism could be the source of the asymmetry. The Froggatt-Nielsen mechanism provides a plausible framework where the Yukawa couplings could all be of order 1 at that time, and settle to their present values before nucleo-synthesis. The problems related to a strong first order electroweak phase transition may also be alleviated in this framework. Our scenario reveals a loophole in the commonly held view that the Kobayashi-Maskawa mechanism cannot be the dominant source of CP violation to play a role in baryogenesis.  相似文献   
65.
We show that the internal control of adaptation can be obtained from the properties of the phase lag that results from phase synchronization of two nonidentical chaotic oscillators. The direction and magnitude of the phase lag depend upon the relative internal properties of the coupled units, and they can be used as indicators during the adjustment of dynamics, i.e., adaptation of the target unit to match that of the control. The properties of the phase lag are obtained using a method based on the estimation of properties of the distributions of relative event times of both (target and control) units. The phase lag dependent mechanism to control the adaptation process was applied to a system of nonidentical R?ssler oscillators and a system of nonidentical Lorenz oscillators. We also elucidate its importance as a control mechanism of the changes of neuronal activity showing its application to neural adaptation.  相似文献   
66.
The interplay between two basic quantities--quantum communication and information--is investigated. Quantum communication is an important resource for quantum states shared by two parties and is directly related to entanglement. Recently, the amount of local information that can be drawn from a state has been shown to be closely related to the nonlocal properties of the state. Here we consider both formation and extraction processes, and analyze informational resources as a function of quantum communication. The resulting diagrams in information space allow us to observe phaselike transitions when correlations become classical.  相似文献   
67.
Let T n be the complete binary tree of height n considered as the Hasse-diagram of a poset with its root 1 n as the maximum element. For a rooted tree T, define two functions counting the embeddings of T into T n as follows A(n;T)=|{S T n  : 1 n S, ST}|, and B(n;T)=|{S T n :1 n S, ST}|. In this paper we investigate the asymptotic behavior of the ratio A(n;T)/B(n;T), and we show that lim  n→∞[A(n;T)/B(n;T)]=2ℓ;−1−1, for any tree T with ℓ leaves. This revised version was published online in June 2006 with corrections to the Cover Date.  相似文献   
68.
In this paper we introduce a method for finding a time independent Hamiltonian of a given Hamiltonian dynamical system by canonoid transformation of canonical momenta. We find a condition that the system should satisfy to have an equivalent time independent formulation. We study the example of a damped harmonic oscillator and give the new time independent Hamiltonian for it, which has the property of tending to the standard Hamiltonian of the harmonic oscillator as damping goes to zero.   相似文献   
69.
We consider a desingularization Γ of a Richardson variety in the variety of complete flags, obtained as a fibre of a projection from a certain Bott-Samelson variety Z. For any projective embedding of Z via a complete linear system, we construct a basis of the homogeneous coordinate ring of Γ inside Z, indexed by combinatorial objects which we call w 0 -standard tableaux.  相似文献   
70.
A linear correlation between isotropic nuclear magnetic shielding constants for seven model molecules (CH2O, H2O, HF, F2, HCN, SiH4 and H2S) calculated with 37 methods (34 density functionals, RHF, MP2 and CCSD(T)), with affordable pcS‐2 basis set and corresponding complete basis set results, estimated from calculations with the family of polarization‐consistent pcS‐n basis sets is reported. This dependence was also supported by inspection of profiles of deviation between CBS estimated nuclear shieldings and shieldings obtained with the significantly smaller basis sets pcS‐2 and aug‐cc‐pVTZ‐J for the selected set of 37 calculation methods. It was possible to formulate a practical approach of estimating the values of isotropic nuclear magnetic shielding constants at the CCSD(T)/CBS and MP2/CBS levels from affordable CCSD(T)/pcS‐2, MP2/pcS‐2 and DFT/CBS calculations with pcS‐n basis sets. The proposed method leads to a fairly accurate estimation of nuclear magnetic shieldings and considerable saving of computational efforts. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号